Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools

Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools

Bugcrowd via YouTube Direct link

Inside a handler

8 of 42

8 of 42

Inside a handler

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Fun with Frida on Mobile - Leveraging Dynamic Analysis Tools

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Black-box testing challenges
  3. 3 Enter Frida
  4. 4 Where does it work?
  5. 5 Frida's toolkit
  6. 6 Simple example - frida-trace on iOS
  7. 7 Digging into a trace
  8. 8 Inside a handler
  9. 9 Modifying handlers
  10. 10 A new and improved trace
  11. 11 Where was that code running?
  12. 12 How can we use Frida?
  13. 13 Tracing functions on Android
  14. 14 Function tracing in action
  15. 15 Using a trace to explore
  16. 16 Exploring keychain functionality
  17. 17 What did we find?
  18. 18 Frida CLI
  19. 19 Exploring Keychain classes
  20. 20 Automating with agent scripts
  21. 21 Tracing Java methods on Android
  22. 22 Building agent.js
  23. 23 Java trace in action
  24. 24 How can we use agents?
  25. 25 Bluetooth metadata on Android
  26. 26 URL scheme fuzzing on iOS
  27. 27 Adding commands
  28. 28 URL scheme fuzzer highlights
  29. 29 Using Frida Codeshare
  30. 30 Bypassing controls - SSL pinning
  31. 31 SSL pinning bypass on iOS
  32. 32 Interceptor API
  33. 33 Locating nw tls create peer trust
  34. 34 Replacing nw_tls_create_peer_trust
  35. 35 Try it for yourself!
  36. 36 SSL pinning bypass - demo
  37. 37 Standalone tools
  38. 38 Elements of a standalone tool
  39. 39 Basic Python script
  40. 40 Frida rpc.exports
  41. 41 The agent: classdump.js
  42. 42 Want to learn more?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.